Disk array and its access right control method and device, server and server system

A technology of access rights and disk arrays, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve the problems of inflexibility, inability to prevent viruses from invading disk arrays, and inability to guarantee data security on disk arrays. Achieve the effects of improving security, avoiding malicious tampering, and preventing viruses from invading disk arrays

Active Publication Date: 2007-10-17
HUAWEI TECH CO LTD
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor found that: the prior art does not restrict the specific access rights to the disk array. All permissions of the volume, including unnecessary write permissions, have at least the following problems: it is impossible to prevent viruses from invading the disk array, and it is also impossible to prevent hackers from maliciously tampering with the data stored on the disk array, and the security of data on the disk array cannot be guaranteed ; In addition, the existing technology is to set its access authority when the logical volume is assembled (mount) before the logical volume is used, or to set its access authority through the file system after the logical volume is mounted. In the process of using the logical volume, it cannot be Change the access permissions of the logical volume set by the above two methods to achieve inflexibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disk array and its access right control method and device, server and server system
  • Disk array and its access right control method and device, server and server system
  • Disk array and its access right control method and device, server and server system

Examples

Experimental program
Comparison scheme
Effect test

specific example

[0052] Table 4 Permission relation table between access permission table and permission permission table

[0053]

[0054] The access rights of the logical volume corresponding to the same LUN ID should be within the scope of its permission rights, and the setting of the access rights table should be subject to the permission table. According to the above table 4, if the permission permission of the logical volume with LUN ID 3 is set to read and write, the access permission of the server to it can be set to read-only, read-write, and inaccessible; if the set logical volume If the permission permission of the logical volume is read-only, the server's access permission to it can be set to read-only or inaccessible; if the permission permission of the logical volume is set to inaccessible, the server's access permission to it can only be set to inaccessible. When modifying the access permission table, the access permission of the logical volume corresponding to the sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a disk array and its access authority control method and devices, server and server system, in which, the method includes: the request for the access of logic volume sent by the disk array receiving server, this access request must have the server identifier, logic volume identifier and access attribute; the disk array query indicates the access authority list of logic volumes access authority for the disk array of servers; according to the access authority list, when the access authority corresponding to the server identifier and the logic volume identifier can't support the access attribute, the disk array refuses the server to access the logic volume in the mode recorded in the access attribute. The invention may effectively protect the disk array against the virus intrusion, avoid the malicious juggle of data saved on the disk array by Hacker, thus improve the safety of data on the disk array.

Description

technical field [0001] The invention relates to the access authority control technology of computer storage media, in particular to a disk array and its access authority control method and device, server and server system. Background technique [0002] With the development of computer technology and the increasing requirements of users for storage performance, the storage media of computer systems have gradually developed from early floppy disks and built-in hard disks to the current external disk arrays. A disk array is a system formed by combining multiple hard disk drives according to certain requirements, and the entire disk array is uniformly managed by the array controller. Compared with the existing storage media, the disk array greatly improves the storage capacity of the computer system, and, because the multiple disk drives that make up the disk array can work in parallel, the data transmission rate is improved, thereby improving the working performance of the comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 陈绍元
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products